Subscribe to Updates
Subscribe to our newsletter and be the first to access exclusive content and expert insights.
Browsing: Data breaches
August 2, 2024Ravi LakshmananCyber Espionage/Malware A Taiwanese government-affiliated research institute specializing in computing and related technologies has been compromised by a nation-state threat actor with ties…
August 2, 2024Ravi LakshmananCyber Attacks / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer…
August 2, 2024Hacker News In today’s digital battlefield, small and medium-sized businesses (SMBs) face the same cyber threats as larger enterprises but with fewer resources, and…
August 2, 2024Hacker NewsVulnerabilities / Network Security Enterprise resource planning (ERP) software is at the core of many businesses, supporting human resources, accounting, shipping, and manufacturing.…
August 2, 2024Ravi LakshmananCybercrime/Hacking News Two Russian nationals serving time for cybercrime offences have been released and repatriated to their home country in a historic prisoner…
August 2, 2024Ravi LakshmananMalware/Network Security Cybersecurity companies are warning that Cloudflare’s free TryCloudflare service is increasingly being used to distribute malware. This campaign, documented by both…
August 1, 2024Ravi LakshmananVulnerability/Threat Intelligence Over one million domains are at risk of being taken over by malicious actors through a technique known as “hijacking.” Sitting…
In another sign that threat actors are constantly looking for new ways to trick users into downloading malware, it was discovered that the question and answer…
August 1, 2024Ravi LakshmananBanking Trojans/Cyber Fraud Cybersecurity researchers have discovered a new Android remote access trojan (RAT). Bingo Mod Not only can they carry out fraudulent…
How to detect and prevent attackers from using these different techniques Obfuscation is an important technique for securing software, but it also carries risks, especially when…